|
К этому устройству также есть другие инструкции:
Фрагмент инструкции
SECURITY
and HP Web Jetadmin
CONTENTS
Overview ................................................................................................................................ 2
Application security .................................................................................................................. 2
Roles and users ..................................................................................................................... 2
HP Web Jetadmin administrator role .................................................................................... 3
Creating roles ................................................................................................................... 3
User/role assignment ......................................................................................................... 3
Alternate log-in prompt ....................................................................................................... 5
Device group restriction type ............................................................................................... 5
User/role diagnostics ......................................................................................................... 6
Managing role permissions and user assignments .................................................................. 7
HTTPS and SSL (Secure Sockets Layer) .................................................................................. 7
Important points to remember when implementing SSL............................................................ 8
Certificates and backup/restore procedures .......................................................................... 8
Digital signatures .................................................................................................................. 9
Network ports ....................................................................................................................... 9
HPWJA service ................................................................................................................... 11
SQL server (HPWJA)—database access and authentication ...................................................... 11
Active Clients task module .................................................................................................... 11
Device security ....................................................................................................................... 12
Passwords and credentials ................................................................................................... 12
The Credentials Store ....................................................................................................... 12
Configuration of a device credential .................................................................................. 13
Credentials delegation ..................................................................................................... 14
Credentials settings and global credentials ......................................................................... 14
Credentials needed .......................................................................................................... 14
Sensitive device information ................................................................................................. 15
Backup/restore note ............................................................................................................ 15
Get Images feature .............................................................................................................. 16
Device disk security ............................................................................................................. 16
Other access controls .......................................................................................................... 17
HP Jetdirect IPsec plug-in ................................................................................................... 17
Disable unused protocols and services ............................................................................... 18
Control panel lock ........................................................................................................... 18
Other device security features ........................................................................................... 18
...